Ice Phishing Takes Advantage of Tectonic Shift to Web3

Ice Phishing Takes Advantage of Tectonic Shift to Web3

The Badger DAO attack last November and December—during which an attacker stole about $121 million from users—is a good example of “ice phishing” on the blockchain. If that term conjures up images of plaid and puffy coat-clad folks huddled around a hole atop a frozen...
A Look at What to Expect in the Cybersecurity World in 2022

A Look at What to Expect in the Cybersecurity World in 2022

Some cybersecurity experts say that complex cybersecurity challenges are coming in 2022, with new types of supply chain-related attacks and attacks aided by artificial intelligence. Several cybersecurity experts offered their ideas about trends in cybersecurity and...
Cloudflare Launches Public Bug Bounty Program

Cloudflare Launches Public Bug Bounty Program

Cloudflare on Tuesday added a public bug bounty program, the vendor’s first such initiative since the cloud security company started its bug bounty program in 2014. In a Feb. 1 blog post, the company said the first iteration of its bug bounty program was pure...
7 Privacy Tips for Security Pros

7 Privacy Tips for Security Pros

Track the Data Tom Garrubba, a vice president at Shared Assessments, says privacy is specifically focused on what an organization is permitted to do with the data it collects from a data subject. With that in mind, it’s important for companies to “follow the data,” he...
Is Multicloud Ready to Become the Cornerstone of DevOps?

Is Multicloud Ready to Become the Cornerstone of DevOps?

Today’s IT reality is distributed and heterogeneous, from the applications to the infrastructure they run on. Organizations are navigating how to deliver apps across any combination of data centers, public clouds and to the edge without compromising...